Read Ahead | Cover6 Solutions Workshops
This guide prepares you for our #PentesterPrep & #SOCAnalystPrep
hands-on cybersecurity training.
First, we want to thank you for your interest in Cover6 Solutions. If you made it this far, that means you have most likely registered for one of our workshops. For that, we are forever grateful, and you will always be considered family to us.
This material summarizes the workshops, the hardware and software requirements, helpful videos, and education references to help you better understand the class content.
Use the tabs below to view the material for your desired workshop.
The #SOCAnalystPrep workshop is the defensive equivalent of the #PentesterPrep workshop. It prepares you to work in a Security Operations Center (SOC) immediately upon completion. For this class, you will need the following tools installed:
- Nessus Essentials
- Windows Sysinternals Suite
- Clicking this link starts the download of the SysinternalsSuite.zip file
- Kali Linux (Optional)
We DO NOT teach Kali Linux in this workshop. However, you will see offensive techniques used by the instructor to simulate attacker activity.
We will provide you access to the following online servers, so be sure to bookmark the following URLs:
Through real-world, hands-on instruction, and with a focus on network defense, we provide a path to a successful career as a Security Operations Center (SOC) Analyst. #SOCAnalystPrep.
Ever wondered what it is like to be on the front line of defense in the Cybersecurity industry? If so, you may be interested in becoming a Security Operations Center (SOC) Analyst.
SOC Analysts are highly sought-after individuals who identify compromised machines and malicious actors. These individuals utilize defensive security skills and techniques that are commonly used in the industry while working to mitigate any damages that may have occurred.
In this training, participants will oversee a network that is currently under attack. Our students will learn various strategies to help defend against several attack scenarios. A few of the tools and technologies that participants will explore include; Security Onion, Wireshark, Splunk, and Nessus. As a participant, we highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.
The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback, as well.
If you have any additional questions outside of the FAQs, please do not hesitate to reach out to email@example.com, and we will be happy to assist you.
Are you interested in learning the skills needed to test the defense of computers and networks around the world? Penetration testing or pentesting is one of the most challenging and rewarding areas of cybersecurity. At Cover6 Solutions, we do pentesting every day and we’re ready to share our knowledge with you if you’re ready to learn!
Welcome to our all-new Pentester Prep Workshop, where you’ll be exposed to the latest tools and technologies available for offensive cyber. Our intensive two-day workshop (Saturday & Sunday 9-5 PM ET) covers everything you need to get started in the red-hot field of pentesting.
You may be brand-new to cyber or maybe you already have some experience; either way, you will be getting your hands dirty and acquiring new skills to succeed in this high-demand field. That’s right, this is a very hands-on course and we have created challenging new labs and a brand-new virtual environment that will closely simulate actual pentesting engagements. We can’t wait for you to try it, we believe this will offer the most realistic pentesting training available today!
This workshop is tailored to prepare students to pass all major pentesting certification exams, including the CompTIA Pentest+, eJPT, and the CEH Practical. The only prerequisites for this workshop are curiosity and enthusiasm: you will need both!
The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well.
If you have any additional questions outside of the FAQs, please do not hesitate to reach out to firstname.lastname@example.org and we will be happy to assist you.
This course is tailored to assist with the preparation for all offensive (practical) exams. It also includes the five primary exam objectives for the CompTIA Pentest+ Certification which are:
- Planning and Scoping
- Information Gathering and Vulnerability Identification
- Attacks and Exploits
- Penetration Testing Tools
- Reporting and Communication
Please note This is NOT an official CompTIA or CEH training class, but rather a preparation course for real scenarios you may encounter in pentesting engagements or on a certification exam. Various tools, techniques, and procedures will be covered during the sessions, so those listed in the syllabus above are just examples. This material is subject to change.
Breaking into Cybersecurity w/ Tyrone E. Wilson
Home Lab Setup | Building an Effective Cybersecurity Learning Environment
Passive Information Gathering
Active Information Gathering
Understanding the Metasploit Database
Incident Handling & Threat Hunting w/ Security Onion: Gain Hands-On Cybersecurity Experience
IPv6 Enumeration & Attacks
Virtual Security Operations Center (SOC) Analyst Prep Workshop (Live) – FREE Session
You can check out the following references to gain familiarity with terms and topics you will hear in class.